Skip to main content

Home/ educators/ Group items tagged in

Rss Feed Group items tagged

Vicki Davis

CPR in Schools - 0 views

  •  
    Train your students in CPR. This is a great thing to share with your health classes. The curriculum is here for you. "The easy-to-use CPR in Schools Training Kit is designed just for schools.  It contains everything needed to train 10 students at once in CPR.  Repeat the process to train a class, a grade - or even an entire school! The CPR in Schools Training Kit is portable, allowing for convenient movement from classroom to classroom and easy storage. One CPR in Schools Training Kit can train hundreds of students!"
Sandy Kendell

Drape's Takes: On Empathy, Culture, and Barriers to Making Technology Integral to Teaching - 12 views

  •  
    "technology now serves as a critical thread that ties many of us together in learning" "until collaboration is a behavior naturally included in every educator's definition of teaching, then many of the contemporary promotions of technology in education will continue to be little more than spit in the wind."
  •  
    "technology now serves as a critical thread that ties many of us together in learning" "until collaboration is a behavior naturally included in every educator's definition of teaching, then many of the contemporary promotions of technology in education will continue to be little more than spit in the wind."
Vicki Davis

The Civil War Augmented Reality Project - 20 views

  •  
    Civil War Augmented Reality project -- just in my inbox. You civil war buffs and history teachers may really get a "kick" out of this. Speaking of "kick" they are trying to get a grant that requires people to vote for them. Take a look: "This message is from a group of educators in Pennsylvania who have developed a Social Studies project that is in the process of raising a modest amount of money to build prototypes for gathering additional partners. Our project, the Civil War Augmented Reality Project, is intended to enhance the experiences of students visiting Civil War sites. It is also intended to increase attendance and revenue for historic sites by offering both "high" and "low" tech experiences to best reach the majority of the population. We feel that our project is fulfilling a need that educators, park workers, technology enthusiasts, and Civil War enthusiasts have discussed in the past: How can historic sites both raise educational value and public interest in their institutions though technology, while not alienating the non-technical history fans? We have worked hard on the answer, and are interested in promoting our creative solutions. We would like to make clear that the project is not intended solely for Pennsylvania. It is our hope that the project will expand to other venues, as we feel that we have the ability to use our ideas to enhance the experiences of all students at historic sites."
Jeff Johnson

A Young Mad Scientist's First Alphabet Blocks | Xylocopa - 0 views

  •  
    At Xylocopa, we know that the key to a successful education is to begin learning at a young age. Like many of you, we are concerned about the state of science education in the public school system, especially in the lower grades. Specifically, we have noticed that there is absolutely no training in the K-6 grades that prepares students to become mad scientists. In this competitive 21st-century world, the need for mad scientists will only increase, but the lack of basic education in primary school leaves us concerned that there will be no future students capable of leading in this illustrious field.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Vicki Davis

Pest Control Information for School Kids and Teachers - PestWorldforKids.org - 0 views

  •  
    This site provides resources and games explaining to elementary students what we consider to be "pests".
  •  
    Just got this in my email. I could see some really fun, funny public service announcements -- cross curricular project for science and technology. This is what they sent me: "The contest challenges students in grades 4 through 8 to use their biology and entomology knowledge, as well as their creativity, to create educational public service announcements (PSAs) that discuss the health and property risks posed by household pests. The grand prize winning entry will receive $3,000 for their school's science department! We know that this award could mean a lot to one of the many schools in the country that are being forced to cut budgets and programs in this difficult economy. As a non-profit organization, NPMA is committed to science education, and never promotes specific products or services. I know that Cool Cat Teachers covers a wide range of topics, but we are hoping that the many science teachers who read your content would be interested in the contest for their schools. We would deeply appreciate your help in spreading the word about this fun and educational contest. The press release below has more information on the contest rules and details. Additional information, including sample PSAs and lesson plans for creating PSAs, are available at www.PestWorldForKids.org."
  •  
    Science contest on this website for creating a PSA.
anonymous

ourlostchildren » home - 0 views

  •  
    Student created wiki. Thomas Cooper is the teacher behind this project. He teachers at the Walker School in Marietta, GA. Many people believe that child labor and abuse is something of the past, but there could not be more of a false statement. Around the world children are being marginalized, and abused, and forced into labor. Children in Africa are being forced to join the military and kill children and adults alike. Other children are living on the streets because their parents' lives were taken by the AIDS virus. And due to India's class system, young children will live in poverty with no possible way of hope in the future. Children are even forced into prostitution and labor. Childhood deformities and disabilities cause affected children to live in isolation and cause pain and suffering for both them and their families. Be sure to check out the teacher resources in the table of contents.
Jedd Bartlett

Dave's Educational Blog » Blog Archive » Rhizomatic Education : Community as ... - 0 views

  •  
    In the rhizomatic model of learning, curriculum is not driven by predefined inputs from experts; it is constructed and negotiated in real time by the contributions of those engaged in the learning process. This community acts as the curriculum, spontaneously shaping, constructing, and reconstructing itself and the subject of its learning in the same way that the rhizome responds to changing environmental conditions...
  •  
    In the rhizomatic model of learning, curriculum is not driven by predefined inputs from experts; it is constructed and negotiated in real time by the contributions of those engaged in the learning process. This community acts as the curriculum, spontaneously shaping, constructing, and reconstructing itself and the subject of its learning in the same way that the rhizome responds to changing environmental conditions:
Patti Porto

AwesomeStories.com, The Story Place of the Web - 0 views

  •  
    AwesomeStories is a gathering place of primary-source information. Its purpose - since the site was first launched in 1999 - is to help educators and individuals find original sources, located at national archives, libraries, universities, and government web sites. Sources held in archives, which document so much important first-hand information, are often not searchable by popular search engines. One needs to search within those institutional sites directly, using specific search phrases not readily discernible to non-scholars. The experience can be frustrating, resulting in researchers leaving sites without finding needed information. AwesomeStories is about primary sources. The stories exist as a way to place original materials in context and to hold those links together in an interesting, cohesive way (thereby encouraging people to look at them). It is a totally different kind of web site in that its purpose is to place primary sources at the forefront - not the opinions of a writer. Its objective is to take a site's users to places where those primary sources are found, and to which the site's users may otherwise not go. The author of each story is listed on the "chapters" page of the story. A link to the author provides more detailed information.
Vicki Davis

Tag Overload - 110 views

Just remember that we only 16 tags -- that is NOT a lot! Also -- looking at it by NOUN is important. Who is a person -- I"m an administrator so I'd be interested in this. I found that structure ...

Maggie Verster

The Association for Progressive Communications (APC) ICT policy handbook - Zu... - 2 views

  •  
    "This handbook aims to take the mystery out of ICT policy and make it easier to understand. In particular, it aims to build the capacity of those who want to understand more about the issues surrounding policy on ICT development and regulation, to grasp the policy process, and to become more involved as informed participants.The main text of the handbook has been written by experts in the field so that readers get a basic understanding of the issues. It can then be used as a platform for further investigation. Each chapter seeks to give an objective account of existing issues, rather than presenting any specific point of view. Where issues are controversial, the different viewpoints involved have been explained so that the reader has a clear view of the issues in dispute. Examples are also given of recent events or debates, which readers can explore further if so inclined. Suggestions as to where readers can find out more about ICT policy can also be located in the bibliography and list of organisations active in the field which are in appendices. "
Ben Rimes

A Call for Technology Leadership - 16 views

  • (1) modeling the use of new technologies in communicating to students, teachers and the general public; (2) ensuring that technology becomes integral to teaching 21st-century skills from critical thinking and problem solving to collaboration and information literacy in the classroom; (3) boosting Web 2.0 applications and tools as key components of student learning; (4) offering professional development in these technologies and deploying the online tools that help teachers create learning communities among themselves; and (5) requiring better balanced assessments of student work—including project-based learning enhanced by technology tools—in an age driven by NCLB-oriented testing and better use of data from the assessments to help students improve their performance.
    • Ben Rimes
       
      Asking any leader to model effective strategies makes sense, but shouldn't the imperative of offering professional development in newer communications tools come first? Some district leader's I can see jupming into new tools and ways to communicate, but you can't expect all veteran leaders to adopt new tools without the development and support they'll need.
    • Ben Rimes
       
      I'm curious to know in how many districts does the Superintendent serve as the curriculum leader capable of making the sweeping changes to move a district towards project-based learning. I have an inkling that many superintendents find niches that make them valubale, whether it's focusing on assessment, community relations, curriculum, or something else.
  • The revised edition also includes a self-assessment for superintendents to evaluate how far their districts have come along the technological curve. CoSN’s CEO Keith Krueger explains that his organization’s research shows that many district leaders are behind that curve, and the new document opens with a letter:
    • Ben Rimes
       
      Not surprising at all...
  • e cautions that the large-scale changes CoSN is advocating are most likely to happen for district leaders who are not engaged in dozens of other initiatives. “Everybody wants the superintendent to be in the middle of everything,” Reeves explains. “The real acid test is whether you can execute the ‘not-to-do list,’” adding that superintendents need to resist establishing too many priorities. Each of the five areas featured in “Empowering the 21st Century Superintendent” includes a set of resources and a series of action steps for superintendents and district leadership teams. For instance, in the 21st-century skills section, leaders are urged to improve their own such skills, create a vision for integrating them into K12 instruction, audit the district’s strategic plan to see which might be missing and adjust professional development accordingly.
    • Ben Rimes
       
      Love the pragmatism in this quote. Good acknowledgement that district superintendents are engufed in far too much at times, and thus tech-integration may not realistically happen. Good to know that the framework provided by CoSn also includes some directions for district tech teams.
David Warlick

Reggio Emilia approach - Wikipedia, the free encyclopedia - 4 views

  • Children must have some control over the direction of their learning; Children must be able to learn through experiences of touching, moving, listening, seeing, and hearing; Children have a relationship with other children and with material items in the world that children must be allowed to explore and Children must have endless ways and opportunities to express themselves.
    • David Warlick
       
      This is all very familiar yet rarely expressed so succinctly.
  • In the Reggio approach, the teacher is considered a co-learner and collaborator with the child and not just an instructor.
  • Teacher autonomy is evident in the absence of teacher manuals, curriculum guides, or achievement tests
  • ...7 more annotations...
  • integration of each classroom with the rest of the school, and the school with the surrounding community
  • children can best create meaning and make sense of their world through environments which support "complex, varied, sustained, and changing relationships between people, the world of experience, ideas and the many ways of expressing ideas."
  • In each classroom there are studio spaces in the form of a large, centrally located atelier and a smaller mini-atelier, and clearly designated spaces for large- and small-group activities.
    • David Warlick
       
      A workshop or studio especially for an artist, designer or fashion house.
  • Reggio teachers place a high value on their ability to improvise and respond to children's predisposition to enjoy the unexpected.
  • Regardless of their origins, successful projects are those that generate a sufficient amount of interest and uncertainty to provoke children's creative thinking and problem-solving and are open to different avenues of exploration
  • teachers in Reggio Emilia assert the importance of being confused as a contributor to learning; thus a major teaching strategy is purposely to allow mistakes to happen, or to begin a project with no clear sense of where it might end.
  •  
    The Reggio Emilia Approach is an educational philosophy focused on preschool and primary education. It was started by Loris Malaguzzi and the parents of the villages around Reggio Emilia in Italy after World War II. The destruction from the war, parents believed, necessitated a new, quick approach to teaching their children. They felt that it is in the early years of development that children are forming who they are as an individual. This led to creation of a program based on the principles of respect, responsibility, and community through exploration and discovery in a supportive and enriching environment based on the interests of the children through a self-guided curriculum.
Claude Almansi

Beware of Google's power; brings traffic to websites but it can also taketh away - Tech... - 1 views

  •  
    "Ahmed ElAmin Published Jul 20, 2011 at 9:18 am (Updated Jul 20, 2011 at 8:01 am) Belgians have invented Smurfs, make some of the best beer in the world, and know how to fry a potato chip. However, one must say the country's leading newspapers scored an own goal when they took Google to court last year for listing their content in the search engine's news section and won on copyright. I guess they didn't look at how people arrive at a typical online newspaper site, which derives up to 50 percent or more of their visitors from Google. In addition to taking the group of papers out of its news section, Google also stopped indexing them in its search engine. Now the newspapers are complaining that they are being discriminated against unfairly! (...) Google has big power and the danger is how the company wields it in pursuit of profit. It brings traffic to websites, but the company that claims to "do no evil" can also taketh away ostracising those for good and bad reasons. The company is also stepping up its aggregation news service by trying to attract more volume through the "gamification" of Google News. Google is following a trend among news sites to bring readers in. With their consent, readers will be rewarded with "news badges" based on their reading habits. Badges of varying levels will be given out depending on the amount and types of articles you read. About 500 badges are available to suit a wide range of topics. Google News indexes about 50,000 sources. Keep reading and get those badges! Maybe."
Claude Almansi

Network theories for technology-enabled learning and social change: Connectivism and ac... - 1 views

  •  
    "Bell, F 2010, Network theories for technology-enabled learning and social change: Connectivism and actor network theory , in: Networked Learning Conference 2010: Seventh International Conference on Networked Learning, 3-4 May 2010, Aalborg, Denmark. PDF - Published Version Download (236Kb) http://usir.salford.ac.uk/9270/1/Bell.pdf Official URL: http://www.networkedlearningconference.org.uk/ Abstract Learning never was confined to classrooms. We all learn in, out of, before, during and after episodes of formal education. The changing sociotechnical context offers a promise of new opportunities, and the sense that somehow things may be different. Use of the Internet and other emerging technologies is spreading in frequency, time and space. People and organizations wish to use technology to support learning seek theories to frame their understanding and their innovations. In this article we explore Connectivism, that is positioned as a theory for the digital age, in use on a Massive Open Online Course (MOOC), Connectivism and Connective Knowledge, in 2008. We then compare Connectivism with another network theory, Actor Network Theory, to explore possible synergies. We found that Connectivism enables educators and learners to legitimise their use of technology to support teaching and learning. Connectivism, a relatively new theory, can benefit from a richer empirical base as it develops. Since the scope of educational change can vary from a specific learning setting through organisational and societal settings, we can develop theories through empirical exploration of cases across the range of settings to support our understanding and actions."
Jeff Johnson

School Choice Crucible: A Case Study of Boulder Valley - 0 views

  •  
    SCHOOL CHOICE is a controversial public education reform -- but not as controversial as it should be. Support for choice remains strong in the face of mounting evidence that long-standing controversies are being decided in favor of the critics of choice. Our study of the choice program in the Boulder Valley School District adds to the growing body of research documenting serious flaws in the theory, procedures, and outcomes of school choice. Advocates of school choice contend that competition gives parents a voice and the power to vote with their feet. Schools that consistently perform poorly will lose "clients" and be forced to go "out of business," resulting in overall improvement in both achievement and parental satisfaction. Advocates of choice also contend that school choice can better accommodate a diversity of student interests and needs than the "one-size-fits-all" approach they ascribe to traditional public schools. Finally, they contend that school choice can reduce inequities. School choice is really nothing new, according to them, for parents have long chosen schools by choosing their place of residence.
Jeff Johnson

An Inconvenient Truth About Education: Rethinking the Way Things Are | Edutopia - 1 views

  •  
    Watching the Oscar-winning global-warming documentary An Inconvenient Truth, I was struck by the similarities between climate change and education change. These seemingly unrelated crises on our planet and in our schools are, in fact, connected. Both have taken many decades to develop and, at least in the United States, both originated in an industrial economy built on manufacturing. The effects of global warming and school decline are difficult to detect year to year, but over several generations, their impacts accumulate -- and are now converging to limit the future health of our economy and our society. To reverse these declines, similar fundamental shifts in thinking and behavior will be required at the individual, institutional, and societal levels. Consuming less, recycling more, and the ethic of caring for the environment should begin with our youngest children, as modeled by their parents, teachers, and caregivers. It's the same with literacy, curiosity, and a love of learning. Just as green technologies can make energy consumption more efficient, learning technologies can play a key role in modernizing the learning process.
Dennis OConnor

Code of Best Practices in Fair Use for Media Literacy Education - 4 views

  • Code of Best Practices in Fair Use for Media Literacy Education
  •  
    The Center for Social Media is a project of the School of Communication at the American University in Washington, D.C. The Center in conjunction with the Media Education Lab at Temple University in Philadelphia and The Program on Information Justice and Intellectual Property, a project of the Washington College of Law at the American University in Washington D.C. has developed a Code of Best Practices in Fair Use for Media Literacy Education. The National Council of Teachers of English is signatory to the document, along with various other legal and educational groups. The code was funded by The John D. and Catherine T. MacArthur Foundation and The Ford Foundation through the Future of Public Media Project. (Annotation by Larry Michaud - UW-Stout E-Learning Practicum)
Vicki Davis

Call for Artwork :: Mission 10,000 Rockets - 3 views

  • Every invention starts from a simple drawing on a paper. To celebrate the DigitalGlobe™ satellite launch that will capture high-resolution pictures for Bing™ Maps, we want to borrow kids' imaginations to create the rocket of tomorrow.
  • Of the first 10,000 drawings submitted, every school that submits at least 20 drawings will be entered into a drawing to win a $5,000 donation from Bing™ and a portion of the book proceeds.
  •  
    ! Of the first 10,000 drawings submitted, every school that submits at least 20 drawings will be entered into a drawing to win a $5,000 donation from Bing™ and a portion of the book proceeds. We understand this is quite a tight deadline. To help you out, we are going to provide you with some educational materials. The first 500 teachers to fill out an information request form on Artsonia will get a poster for the classroom, along with a satellite and rocket fact sheet and some fun rocket trading cards. You may also download pdf printable versions of the educational materials. In addition, students can watch the Delta II rocket launch video on www.10000rockets.com. Then, in early November, Bing™ will have a panel of scientists talking about rockets and you can use that for further inspiration in the classroom. As the students are learning about rockets, we want to get 10,000 of them to draw the rocket of tomorrow. Drawings can be uploaded on Artsonia from 10/8/09-11/25/09. We will do a few things with the drawings: * The first 10,000 drawings will be published in your Artsonia school gallery and showcased on a dedicated gallery website, www.10000rockets.com. * Schools who submit at least 20 drawings will be entered into a drawing to win* one of eight $5,000 donations. * Each drawing will be judged by a panel of Microsoft employees in conjunction with scientists. The judges will select one from each grade group (K-5, 6-8, 9-12) that inspires them and turn these student drawings into 3-D models to honor their invention. * The first 10,000 qualified drawings will be placed into a commemorative book and sold on 10000rockets.com. Proceeds from the book will be donated to 8 of the schools who have students featured in the book, chosen at random.
yc c

pdf document - 8 views

  •  
    Critics of wikis as research sources often point to the potential for students to stumble across inaccurate content as a fatal flaw that make wikis almost worthless. "How can we promote wikis in our classrooms," the argument goes, "if you can't trust what's posted there? I don't want my students exposed to learning tools that are just plain wrong!" Teachers using wikis successfully in their classrooms, however, embrace inaccurate content posted on classroom wikis as a teachable moment because they know that succeeding as consumers of information in the 21st Century requires students to develop a healthy skepticism of any content posted online. In a world where content is constantly changing and publishing is easy for anyone, researchers simply cannot assume that digital sources-wikis, blogs, websites, online videos-are accurate and up-to-date. Wikis give teachers built in opportunities to teach lessons about the reliability of online content to students. Errors-which are inevitable in student projects-can be spotlighted and corrected, and students can be introduced to strategies for identifying content worth trusting.
« First ‹ Previous 81 - 100 of 4651 Next › Last »
Showing 20 items per page